GRADE-8 COMPUTERS CLASS WORK file · Web view2018-2019mr. yousuf valisri chaitanya olympiad school...

27
GRADE-8 COMPUTERS CLASS WORK

Transcript of GRADE-8 COMPUTERS CLASS WORK file · Web view2018-2019mr. yousuf valisri chaitanya olympiad school...

GRADE-8 COMPUTERS CLASS WORK

CHAPTER-11. WEB CONCEPTS

I FILL IN THE BLANKS1. CLOUD COMPUTING2. CENTRAL3. ELECTRONIC BANKING4. ONLINE SHOPPING/E-SHOPPING

II TRUE OR FALSE

1. F2. T3. T4. F

III. POPULAR CLOUD SERVICES

CLOUD FREE(GB) PURCHASE STORAGEADRIVE 50 GB $2.50 10GBAMAZON 5GB 12$/YEAR UNLIMITEDICLOUD 5GB 99 CENTS 20GBBITCASA 5GB 10$/MONTH 1TBBOX 10GB 5$ 100GBCOPY 15GB 5$/MONTH 250GBCUBBY 5GB 4$ 100GBDROPBOX 2GB 15$ UNLIMITEDGOOGLE DRIVE 15GB 2$/M---100GB 10$/M----1

TBONE DRIVE 15GB 2$/M-100GB 7$/M—1 TB

IV. ANSWER THE FOLLOWING QUESTIONS

1. WHAT IS CLOUD COMPUTING?ANS)

CLOUD COMPUTING LETS YOU TO KEEP INFORMATION ON SERVER, LATER YOU CAN

ACCESS THROUGH SMARTPHONE, TABLET, LAPTOP OR DESKTOP.

2. WHAT ARE THE ADVANTAGES OF CLOUD COMPUTING?ANS)

IT REDUCES THE PURCHASING COST INSTALLATION OF SOFTWARE IS NOT NEEDED USER CAN ACESS HIS DATA FROM ANYWHERE

IN THE WORLD

3. DEFINE INTERNET BANKING AND ADVANTAGES?ANS)

A METHOD OF BANKING IN WHICH TRANSACTIONS ARE CONDUCTED ELECTRONICALLY THROUGH INTERNET

ADVANTAGES: IT IS SIMPLE TO OPEN AND USE THE INTERNET

BANKING ACCOUNT IT REDUCES TIME TO WAIT IN A QUEUE OF

BANK4. WHAT IS ONLINE FILE SHARING?

ANS) AN ONLINE FILE SHARING ALLOWS YOU TO

STORE AND ACCESS INFORMATION THROUGH CLOUDS.

ANYONE WHO HAS INTERNET CAN ACESS FILES FROM ANYWHERE AT ANY TIME

5. DISCUSS ABOUT ADVANTAGES OF ONLINE FILE SHARING?

ANS) USED TO SHARE LARGE SIZE OF FILES NO INVESTMENT FOR STORAGE ACESS YOUR FILES GLOBALLY

CHAPTER-22. WORKING WITH MS-ACCESS

I.BLANKS:1. PRIMARY KEY2. DATABASE3. DYNASET

4. DESIGN5. DESIGN

II. TRUE OR FALSE:1.F2.T3.F4.T5.TIII. MULTIPLE CHOICE QUESTIONS:1.A2.C3.B4.C5.CIV. ANSWER THE FOLLOWING QUESTIONS:1. DEFINE PRIMARYKEY AND WRITE ITS

RULES?ANS) A PRIMARY KEY IS THE COLUMN THAT

UNIQUELY IDENTIFIES EACH ROW IN A TABLE.

RULES: IT SHOULD NOT CONTAIN NULL VALUE A TABLE CAN NOT HAVE MORE THAN ONE

PRIMARY KEY2. WHAT IS FOREIGN KEY?

ANS) A FOREIGN KEY IS A FIELD IN A

RELATIONSHIP TABLE THAT MATCHES PRIMARYKEY COLUMN OF ANOTHER TABLE

3. EXPLAIN QUERIES AND REPORTS?ANS)QUERY:

QUERY IS A DATABASE OBJECT IT IS USED TO EXTRACT SPECIFIC

INFORMATION FROM THE DATABASE FORMS:

A FORM IS A DATABASE OBJECT IT IS USED TO EDIT, ENTER OR DISPLAY

THE DATA FROM A TABLE4. WRITE THE STEPS TO CREATE QUERY

USING QUERY WIZARD?ANS)

CLICK ON CREATE TAB SELECT QUERYWIZARD FROM OTHER

GROUP

SELECT ‘SIMPLE QUERYWIZARD’ AND CLICK ON ‘OK’

SELECT THE TABLE NAME AND COLUMN TO BE DISPLAYED

CLICK ON NEXT AND FINISH BUTTON

5. WRITE THE STEPS TO CREATE REPORT USING REPORT WIZARD?ANS)

CLICK ON CREATE TAB SELECT REPORTWIZARD FROM REPORT

GROUP SELECT THE COLUMN TO BE DISPLAYED SELECT THE LAYOUT FOR THE REPORT CLICK ON FINISH BUTTON

CHAPTER-3 3. COMPUTER VIRUSI. BLANKS:1. COMPUTER VIRUS2. EXECUTABLE3. VITAL INFORMATION RESOURCE UNDER SEIGE

II. TRUE OR FALSE : 1.F2.T3.T4.T5.F

III. MATCHING:1. E2. D3. A4. B5. CIV. ANSWER THE FOLLOWING QUESTIONS

Q1) WHAT IS COMPUTER VIRUS? HOW CAN VIRUSES TRANSMITTED?

ANS) Computer virus: IT IS A TYPE OF SOFTWARE PROGRAM THAT REPRODUCES AND SPREADS ITSELF.How Viruses can be transmitted:

TO OPEN INFECTED E-MAIL ATTACHMENTS ON THE INTERNET.

BY TRANSFERRING DATA FROM USBQ2) BRIFLY EXPLAIN 3 TYPES OF VIRUSES?ANS)Worms: THE WORMS ARE SIMILAR TO VIRUSES, IT HAS THE ABILITY TO SELF REPLICATE ITSELFAND SPREAD THROUGH E-MAILS.

Spyware: IT IS ALSO CALLED SPYBOTS, THIS VIRUS SECRETLY GATHERS INFORMATION FROM THE USERMalware: IT IS ALSO CALLED MALICIOUS SOFTWARE, SPECIALLY DESIGNED FOR DAMAGING YOUR COMPUTER.

Q3) WRITE 3 STEPS TO PROTECT YOUR SYSTEM FROM VIRUS?ANS)Steps to protect your system :

1) DO NOT OPEN MAILS SENT FROM UNKNOWN PERSONS.

2) DON’T DOWNLOAD SOFTWARE FROM UN TRUSTED SITES.

3) DO NOT CLICK ON POPUP MENUS WHILE BROWSING

Q4) WHAT IS ANTIVIRUS SOFTWARE? WRITE EXAMPLES?ANS)Anti-virus: IT IS A TYPE OF UTILITY USED FOR SCANNING AND REMOVING VIRUSES FROM THE COMPUTEREXAMPLES: NORTON ANTI VIRUS, MCAFEE, KASPERSKY

CHAPTER-44. DHTML

I.BLANKS1. FRAME2. TABLE3. FORM4. TEXT5. INPUT6. SUBMIT7. RESET8. DROPDOWNLIST

9. CHECKBOX

CHAPTER-55. OPEN SOURCE SOFTWARE

I.BLANKS:1. COPYRIGHT2. LEGAL3. JOINT AUTHORS4. OPEN SOURCE5. MYSQL, MOZILLA FIREFOX, NETBEANS, LINUX AND GNU6. OPEN SOURCE7. NETBEANS8. FIREFOX9. RELATIONAL DATABASE MANAGEMENT SYSTEMII. ANSWER THE FOLLOWING QUESTIONS1.WHAT IS OPEN SOURCE? WRITE EXAMPLES

OF OSS?ANS)

OPEN SOURCE SOFTWAARE IS A SOFTWARE THAT CAN BE FREELY USED MODIFIED AND SHARED BY ANYONEEXAMPLES:

TUXPAINT PIVOT ANIMATOR MOZILLA LINUX OPEN OFFICE

2.WHAT IS A COPYRIGHT?ANS)COPYRIGHT IS A LEGAL RIGHT GIVEN TO THE CREATOR OF THEIR ORIGINAL WORK.

3.WHO OWNS THE COPYRIGHT IN A WORK?ANS)THE AUTHOR CAN CLAIM COPYRIGHT TO THE WORK UNLESS THE AUTHOR GRANTS RIGHTS TO OTHERS IN A WRITTEN AGREEMENT4.WHICH WORKS ARE PROTECTED BY

COPYRIGHT?ANS)

LITERARY WORKS MUSICAL WORKS DRAMATIC WORKS

SOUND RECORDINGS ARCHITECTURAL WORKS

CHAPTER-66. PROGRAMMING WITH C

I.ABBREVIATIONS1. BCPL: BASIC COMBINED PROGRAMMING LANGUAUE2. COBOL: COMMON BUSINESS ORIENTED LANGUAGE3. CPL: COMBINED PROGRAMMING LANGUAUE4. FORTRAN: FORMULA TRANSLATOR

II.BLANKS1. DENNIS RITCHIE2. FUNCTION3. 324. BITS AND BYTES5. UNIX

6. IDENTIFIERS7. DATA TYPES8. getch()9. RUN

III. MATCHING1. D2. F3. E4. A5. B6. C7. I8. G9. H

IV ANSWER THE FOLLOWING QUESTIONS

1. WHAT ARE THE FEATURES OF C LANGUAGE?ANS)

C IS HIGHLY STRUCTURED PROGRAMMING LANGUAGE

C HAS 32 KEYWORDS C CAN CONVERT BITS AND BYTES C HAS VARIOUS OPERATORS AND DATA

TYPES

UNIX OPERATING SYSTEM IS DESIGNED THROUGH C LANGUAGE

2. DEFINE TOKENS?ANS)

THE INDIVIDUAL ELEMENTS OF A PROGRAM IS CALLED AS TOKENS.

THERE ARE 6 TYPES OF TOKENS THEY ARE: IDENTIFIERS KEYWORDS CONSTANTS OPERATORS SPECIAL CHARACTERS STRINGS

3. EXPLAIN KEYWORDS OF C LANGUAGE?ANS)

auto double int Struct Const Short Float unsigned

Break Else Long Switch Continue For Signed Void

Case Enum Register

Typedef Default Goto Sizeof Volatile

Char Extern Return Union Do If Static while

4. BRIEFLY EXPLAIN DATA TYPES?

ANS) A DATA TYPE DEFINES A SET OF VALUES AND THE OPERATIONS THAT CAN BE PERFORMED ON THEM.

5. EXPLAIN THE STRUCTURE OF C PROGRAM?ANS)

STRUCTURE OF C PROGRAM DOCUMENTATION SECTION LINKING SECTION DEFINITION SECTION main() FUNCTION

{ DECLARATION PART EXECUTABLE PART

}

6. HOW TO COMPILE AND EXECUTE THE C PROGRAM?ANS) COMPILER:

THE COMPILER AUTOMATICALLY CONVERTS THE PRGRAM INTO MACHINE CODE.

THE MACHINE CODE IS SAVED WITH AN EXTENSION OF .obj FILE.

PRESS Alt + F9 FOR COMPILATION.EXECUTION:

THE RUN OPTION WILL DO THE EXECUTION OF THE PROGRAM.

AFTER EXECUTION OUTPUT IS DISPLAYED ON THE CONSOLE.

PRESS Ctrl + F9 FOR EXECUTION

CHAPTER-77. MORE ON C-LANGUAGE

I. WHO AM I:1. FOR LOOP2. NESTED IF STATEMENT3. BREAK4. SCANF () FUNCTION

5. PRINTF () FUNCTION

II. FILL IN THE BLANKS:1. COMPOUND2. LOOP3. WHILE4. CONTINUE5. STRUCTUREIII. ANSWER THE FOLLOWING QUESTIONS1. EXPLAIN ABOUT CONTROL

STATEMENTS?ANS)

CONTROL STATEMENTS ARE USED TO CHANGE THE SEQUENCE PROGRAM EXECUTION.

THERE ARE 3 TYPES OF CONTROL STATEMENTS, THEY ARE:

2.EXPLAIN ABOUT LOOPING STATEMENTS?ANS)

A PORTION OF THE PROGRAM THAT IS EXECUTED REPEATEDLY IS CALLED A LOOP.

THERE ARE 3 DIFFERENT TYPES OF LOOPS IN C LANGUAGE THEY ARE:

3.COMPLETE THE PROGRAM TO CALUCULATE FACTORIAL AT ANY NUMBER?ANS)TO CALUCULATE FACTORIAL OF ANY NUMBER/* FACTORIAL OF ANY NUMBER*/#include<stdio.h>#include<conio.h>void main(){int i,n;long int fact=1;clrscr();printf(“enter n value:”);scanf(“%d”,n);for(i=1;i<=n;i++){fact=fact*i;printf(“factorial is:%ld”,fact);}getch();}Output: ENTER N VALUE: 8 FACTORIAL IS: 40320

CHAPTER-88. MULTIMEDIA AND ANIMATION

I.BLANKS:1. SIMULATION2. ANIME3. LIVE ACTIONII. ANSWER THE FOLLOWING QUESTIONS?

1. WHAT DO YOU MEAN BY MULTIMEDIA AND ANIMATION?

ANS)MULTIMEDIA:

THE MULTIMEDIA IS A COMBINATION OF TEXT, AUDIO, VIDEO, IMAGES AND GRAPHICS.

ANIMATION:

A MOVEMENT IS CREATED BY DISPLAYING A SERIES OF PICTURES ON A FRAME IS CALLED ANIMATION.

2. WHAT DO YOU MEAN BY ROTOSCOPING ANIMATION?

ANS)ROTOSCOPING ANIMATION IS USED IN

DISNEY FILMS. THE ANIMATORS SHOOT REAL LIFE

SEQUENCE AND IMPOSE REAL LIFE CHARACTERS AS ARTIFICIAL CHARACTERS.

3. WHAT IS CUT OUT ANIMATION?ANS)

CUT OUT ANIMATION IS A FORM OF STOP MOTION ANIMATION USED IN BACKGROUNDS AND THEY CUT FROM THE MATERIAL SUCH PAPERS AND FABRICS.

4. WRITE ANY TWO USES OF MULTIMEDIA AND ANIMATION?

ANS)ART AND RELATED INDUSTRIESEDUCATIONADVERTISEMENTMEDICINE AND OTHER SCIENTIFIC RESEARCHSIMULATION AND VIRTUAL REALITY.